Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more
☆126Apr 17, 2020Updated 5 years ago
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou☆31Aug 27, 2019Updated 6 years ago
- ☆144Jan 8, 2020Updated 6 years ago
- Most common Linux commands and their examples☆57Feb 20, 2019Updated 7 years ago
- OSCP☆577Feb 6, 2022Updated 4 years ago
- High-precision, real-time people locator via a link☆18Nov 28, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- A Powershell Privilege Escalation Enumeration Script.☆315Mar 14, 2018Updated 8 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆544Sep 7, 2025Updated 7 months ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- ☆24Dec 9, 2020Updated 5 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 4 months ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Bash script to generate reverse shell payloads☆19Sep 9, 2023Updated 2 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Search Tinder Users With Filters☆15Jul 26, 2025Updated 8 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- About Us☆19Mar 30, 2024Updated 2 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆77Jan 30, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- JWT_Brute☆32Oct 10, 2019Updated 6 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Website vuln example.☆11Sep 26, 2025Updated 6 months ago
- Becoming the spider, crawling through the webs to catch the fly.☆84Jun 25, 2021Updated 4 years ago
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago